Quantum Network: Security Assessment and Key Management

Author(s):  
Hongyi Zhou ◽  
Kefan Lv ◽  
Longbo Huang ◽  
Xiongfeng Ma
2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Teng-Yun Chen ◽  
Xiao Jiang ◽  
Shi-Biao Tang ◽  
Lei Zhou ◽  
Xiao Yuan ◽  
...  

AbstractQuantum key distribution (QKD) enables secure key exchanges between two remote users. The ultimate goal of secure communication is to establish a global quantum network. The existing field tests suggest that quantum networks are feasible. To achieve a practical quantum network, we need to overcome several challenges including realizing versatile topologies for large scales, simple network maintenance, extendable configuration and robustness to node failures. To this end, we present a field operation of a quantum metropolitan-area network with 46 nodes and show that all these challenges can be overcome with cutting-edge quantum technologies. In particular, we realize different topological structures and continuously run the network for 31 months, by employing standard equipment for network maintenance with an extendable configuration. We realize QKD pairing and key management with a sophisticated key control centre. In this implementation, the final keys have been used for secure communication such as real-time voice telephone, text messaging and file transmission with one-time pad encryption, which can support 11 pairs of users to make audio calls simultaneously. Combined with intercity quantum backbone and ground–satellite links, our metropolitan implementation paves the way toward a global quantum network.


2013 ◽  
Vol 646 ◽  
pp. 235-239
Author(s):  
Hana Do ◽  
Hoon Jeong ◽  
Eui In Choi

The cloud environment is recently emphasized when we save a large amount of data with a minimum of maintenance. But the cloud is a variable environment that data is likely to be changed when which is transferred, and even doesn't permanently store. Besides it has the risk of phishing from a third party. A scalable storage space as one of the features of the cloud has to consist as more proactive access control, secure encryption, and key management in the aspect of the size of the database and the number of users. In this paper, we analyze about database security requirements of these environment and the provided encryption technologies of until now. And, even anyone who don't have the expertise for security assessment and management or CC could be easily accessible it.


Sign in / Sign up

Export Citation Format

Share Document